EP4276667A1 - Encryption method and apparatus, electronic device, and medium - Google Patents

Encryption method and apparatus, electronic device, and medium Download PDF

Info

Publication number
EP4276667A1
EP4276667A1 EP22745279.4A EP22745279A EP4276667A1 EP 4276667 A1 EP4276667 A1 EP 4276667A1 EP 22745279 A EP22745279 A EP 22745279A EP 4276667 A1 EP4276667 A1 EP 4276667A1
Authority
EP
European Patent Office
Prior art keywords
encryption
input
manner
electronic device
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP22745279.4A
Other languages
German (de)
English (en)
French (fr)
Inventor
Bo Zhang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Publication of EP4276667A1 publication Critical patent/EP4276667A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04886Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Definitions

  • This application belongs to the technical field of information encryption, and specifically relates to an encryption method and apparatus, an electronic device, and a medium.
  • the user can trigger the electronic device to encrypt the application program. For example, the user can select an identifier of an application program in an "app lock" function of the "settings" application program of the electronic device, thereby triggering the electronic device to encrypt the application program, so that other users cannot view contents of the application program.
  • the purpose of the embodiments of this application is to provide an encryption method and apparatus, an electronic device, and a medium, which can solve the problems that steps of encryption in the electronic device are cumbersome, and the encryption manner is relatively rigid and inflexible.
  • the embodiments of this application provide an encryption method, and the method includes: receiving a first input by a user; displaying N encryption controls in response to the first input, where each of the N encryption controls corresponds to an encryption manner; receiving a second input by the user for a target object currently displayed on the electronic device and a first encryption control of the N encryption controls; and processing, in a case that the first encryption manner matches the target object, the target object in the first encryption manner in response to the second input, where the first encryption manner is an encryption manner corresponding to the first encryption control.
  • the embodiments of this application provide an encryption apparatus, and the encryption apparatus includes a receiving module, a display module, and a processing module.
  • the receiving module is configured to receive a first input by a user; the display module is configured to display N encryption controls in response to the first input, where each of the N encryption controls corresponds to an encryption manner; the receiving module is further configured to receive a second input by the user for a target object currently displayed on the electronic device and a first encryption control of the N encryption controls; and the processing module is configured to process, in a case that the first encryption manner matches the target object, the target object in the first encryption manner in response to the second input, where the first encryption manner is an encryption manner corresponding to the first encryption control.
  • the embodiments of this application provide an electronic device, where the electronic device includes a processor, a memory, and a program or an instruction stored in the memory and executable on the processor, and when the program or the instruction is executed by the processor, the steps of the encryption method according to the first aspect are implemented.
  • the embodiments of this application provide a readable storage medium.
  • the readable storage medium stores a program or an instruction, and when the program or the instruction is executed by a processor, the steps of the encryption method according to the first aspect are implemented.
  • the embodiments of this application provide a chip, where the chip includes a processor and a communications interface, the communications interface is coupled to the processor, and the processor is configured to run a program or an instruction, to implement steps of the encryption method according to the first aspect.
  • the first input by the user is received; the N encryption controls are displayed in response to the first input, where each of the N encryption controls corresponds to an encryption manner; the second input by the user for a target object currently displayed on the electronic device and a first encryption control of the N encryption controls is received; and the target object is processed in the first encryption manner in response to the second input in a case that the first encryption manner matches the target object, where the first encryption manner is an encryption manner corresponding to the first encryption control.
  • the N encryption controls after receiving the first input, the N encryption controls can be displayed in response to the first input, and then after receiving the second input for the first encryption control of the N encryption controls and the target object, the target object can be directly processed in the first encryption manner in response to the second input if the first encryption manner corresponding to the first encryption control matches the target object, that is, the target object can be directly encrypted in the first encryption manner.
  • the encryption manner of content encryption can be flexibly selected, and the operation method of content encryption is more convenient.
  • first”, “second”, and the like in the description and the claims of this application are used to distinguish between similar objects, and do not need to be used to describe a specific order or sequence. It should be understood that, data used in such a way are interchangeable in proper circumstances, so that the embodiments of this application can be implemented in an order other than the order illustrated or described herein.
  • Objects classified by “first”, “second”, and the like are usually of a same type, and the number of objects is not limited. For example, there may be one or more first objects.
  • "and/or" represents at least one of connected objects, and a character “/" generally represents an "or” relationship between associated objects.
  • the embodiments of this application provide an encryption method, which includes the following steps 201 to 204.
  • the execution subject of the encryption method provided in the embodiments of this application may be an encryption apparatus, or a control module in the encryption apparatus for executing the encryption method, or may also be an electronic device. This may be specifically determined according to an actual use requirement, and is not limited in this embodiment of this application.
  • the encryption method provided in the embodiments of this application will be exemplarily described below by taking an electronic device as an example.
  • Step 201 An electronic device receives a first input by a user.
  • Step 202 The electronic device displays N encryption controls in response to the first input.
  • Each of the N encryption controls may correspond to an encryption manner, and N is a positive integer.
  • the encryption control can also be called a privacy protection card, an encryption manner card or an encryption option card, which can be determined according to actual usage requirements, and is not limited in this embodiment of the application.
  • the user can trigger the electronic device to display the above N encryption controls through the first input, so that the user can select an encryption control from the N encryption controls, so as to trigger the electronic device to adopt the encryption manner corresponding to the encryption control, to encrypt the object that the user wants to encrypt.
  • the electronic device when the electronic device displays the N encryption controls, the electronic device may enter a privacy protection mode. After the electronic device enters the privacy protection mode, by performing selection input for the encryption control of the N encryption controls and the object displayed by the electronic device, the user can trigger the electronic device to adopt the encryption manner corresponding to the encryption control to encrypt the object.
  • the first input can be a single-click input, a double-click input, a long-press input, or a re-press input by the user in a preset region, or can be a specific voice input (for example, input voice information "enter the privacy protection mode"). This may be specifically determined according to an actual use requirement, and is not limited in this embodiment of this application.
  • the preset region may be an indicator bar region preset in the electronic device for virtual gesture navigation.
  • the first input is a long-press input by the user for the indicator bar region for virtual gesture navigation.
  • the electronic device enters the privacy protection mode in response to the input, and displays 3 encryption controls 32 in (b) in FIG. 2 .
  • step 202 may be specifically implemented by using step 202a.
  • Step 202a The electronic device displays the N encryption controls in a target order in response to the first input.
  • the target order may be determined according to a target matching degree, which may be a matching degree between the object currently displayed on the electronic device and the encryption manner corresponding to each of the N encryption controls.
  • the matching degree between the object currently displayed on the electronic device and the encryption manner refers to: whether the object currently displayed on the electronic device can be encrypted in the encryption manner.
  • the matching degree between the objects currently displayed on the electronic device and the encryption manner is high; when a part of object currently displayed on the electronic device can be encrypted in a certain encryption manner, the matching degree between the object currently displayed on the electronic device and the encryption manner is medium; and when the object currently displayed on the electronic device cannot be encrypted in a certain encryption manner, the matching degree between the object currently displayed on the electronic device and the encryption manner is low.
  • the electronic device may display the N encryption controls sequentially in descending order of the matching degrees between the objects currently displayed by the electronic device and all the N encryption controls.
  • the electronic device may display the encryption control corresponding to the encryption manner at a rear position of the N encryption controls, and display the encryption control in grey.
  • the N encryption controls may be displayed in a target display region, and the target display region supports functions such as left and right sliding, order adjustment of display positions of encryption controls, and addition of other encryption controls.
  • the user when the electronic device cannot display the N encryption controls in the target display region at one time, the user can perform left and right sliding input in the target display region to trigger the electronic device to display encryption controls that are in the N encryption controls and that are not displayed in the target display region on the electronic device.
  • Step 203 The electronic device receives a second input by the user for a target object currently displayed on the electronic device and a first encryption control of the N encryption controls.
  • Step 204 The electronic device processes the target object in the first encryption manner in response to the second input in a case that the first encryption manner matches the target obj ect.
  • the first encryption manner is an encryption manner corresponding to the first encryption control.
  • the electronic device may determine whether the first encryption manner corresponding to the first encryption control matches the target object, and if the first encryption manner matches the target object, the electronic device may process the target object in the first encryption manner, thereby implementing encryption of the target object.
  • the electronic device may perform any operation, or display prompt information to prompt the user that the first encryption manner does not match the target object.
  • whether the first encryption manner matches the target object refers to: whether the target object can be encrypted in the first encryption manner. If the target object can be encrypted in the first encryption manner, the electronic device can determine that the first encryption manner matches the target object; if the target object cannot be encrypted in the first encryption manner, the electronic device can determine that the first encryption manner does not match the target object.
  • the target object may be all objects in the current display interface of the electronic device, may also be some objects in the current display interface of the electronic device, and may also be the current display interface of the electronic device. Specifically, this may be determined according to actual usage requirements, and is not limited in this embodiment of the application.
  • the target object can be an application icon, or can be a specific page, fragment, information, picture, or video in the application program, which may be specifically determined according to actual usage requirements, and is not limited in this embodiment of the application.
  • the second input may be an input of dragging the target object onto the first encryption control; and may also be an input of continuous clicking on the target object and the first encryption control within a preset duration. This may be specifically determined according to an actual use requirement, and is not limited in this embodiment of this application.
  • the target object is an application icon
  • the first encryption control is an encryption control "application hidden”
  • the second input is an input of dragging the application icon 33 (that is, the target object) to the encryption control "application hidden” 34 (that is, the first encryption control).
  • the electronic device may encrypt the application program indicated by the application icon 33, that is, when the user triggers the electronic device to display the interface of the application program, authentication of identity information is required.
  • the target object is content such as fragments, information, pictures, or videos in the application program
  • the first encryption control is an encryption control "content encryption”
  • an encryption control "sticky note encryption” an encryption control "communication content encryption”
  • an encryption control "confidentiality cabinet” the second input is dragging the object 35 in the application program (that is, the target object) to the encryption control "content encryption” 36 (that is, the first encryption control) as shown in (b) in FIG. 3 .
  • the electronic device can replace the target object with shielded characters (such as the character "*" and the character " ⁇ "), and if the user wants to view the target object, the electronic device can prompt the user to input identity information, and if the identity information is successfully verified, the electronic device can display the target object.
  • shielded characters such as the character "*" and the character " ⁇
  • the target object is a specific page in the application program
  • the first encryption control is the encryption control "display fix”
  • the second input is dragging the page of the application program (that is, the target object) to the encryption control "display fix” (that is, the first encryption control). Then, after the electronic device receives the second input, the electronic device may keep displaying the page. If the user wants to trigger the electronic device to display other pages, the electronic device may prompt the user to input identity information, and if the identity information is successfully verified, the electronic device may display other pages.
  • the embodiments of this application provide an encryption method. After receiving the first input, the N encryption controls can be displayed in response to the first input, and then after receiving the second input for the first encryption control of the N encryption controls and the target object, the target object can be directly processed in the first encryption manner in response to the second input if the first encryption manner corresponding to the first encryption control matches the target object, that is, the target object can be directly encrypted in the first encryption manner.
  • the encryption manner can be flexibly selected, and the operation method of object encryption is more convenient.
  • the user can trigger the electronic device to display an encryption manner setting interface through a specific input (for example, the third input in the embodiments of this application), thereby triggering the electronic device to display an encryption control corresponding to the encryption manner in the electronic device (for example, at least one encryption control in the embodiments of this application). Then, by inputting the encryption control corresponding to the encryption manner, the user can trigger the electronic device to display the shortcut start manner of the encryption manner (for example, the target shortcut startup manner) in a specific region (for example, the preset region in the embodiments of this application).
  • a specific input for example, the third input in the embodiments of this application
  • the encryption method provided in the embodiment of this application may further include the following steps 205 to 208.
  • Step 205 The electronic device receives a third input by the user.
  • Step 206 The electronic device displays an encryption manner setting interface in response to the third input.
  • the encryption manner setting interface may include at least one encryption control, and the at least one encryption control may be an encryption control corresponding to the encryption manner in the electronic device.
  • the user can trigger the electronic device to display the encryption manner setting interface through the third input, so that the user can set the shortcut start manner of the encryption manner in the encryption manner setting interface.
  • the encryption manner setting interface may be an interface in the electronic device for setting the encryption manner in the electronic device.
  • the user can trigger the electronic device to perform the following operations by inputting in the encryption manner setting interface: setting the shortcut startup manner of the encryption manner, creating or deleting the encryption manner, and so on.
  • the third input may be a slide-up input or a slide-down input by the user in the indicator bar region for virtual gesture navigation. This may be specifically determined according to an actual use requirement, and is not limited in this embodiment of this application.
  • the electronic device can display an encryption manner setting interface as shown in (b) in FIG. 4 in response to this input.
  • This interface can include seven encryption controls, namely, the encryption control "application encryption”, the encryption control "application hidden”, the encryption control "confidentiality cabinet”, the encryption control "display fix”, the encryption control "content encryption”, the encryption control “sticky note encryption”, and the encryption control "bill encryption”.
  • Step 207 The electronic device receives a fourth input by the user for a second encryption control of the at least one encryption control.
  • Step 208 The electronic device creates a target shortcut startup manner of the second encryption manner in response to the fourth input.
  • the second encryption manner is an encryption manner corresponding to the second encryption control.
  • the user can trigger the electronic device to create the target shortcut startup manner of the second encryption manner by performing the fourth input for the second encryption control of the at least one encryption control.
  • the electronic device may create the target shortcut startup manner in a preset region on the display of the electronic device.
  • the electronic device may create the target shortcut startup manner in a preset region on the display of the electronic device.
  • the user can trigger the electronic device to display the object encryption interface corresponding to the second encryption manner.
  • the preset region may be any possible region such as the upper left corner, the upper right corner, the lower left corner, or the lower right corner of the display of the electronic device, which may be determined according to actual usage requirements and is not limited in the embodiments of the present disclosure.
  • the fourth input may be an input of dragging the second encryption control to the preset region; the fourth input may also include a first sub-input and a second sub-input, where the first sub-input may be a long-press input for the second encryption control, and the second sub-input may be an input for dragging the second encryption control to a preset region.
  • the electronic device when the user long-presses the second encryption control, the electronic device can enter the editing mode in response to the input, and then the user can drag the second encryption control to the preset region, thereby triggering the electronic device to create the target shortcut startup manner of the second encryption manner, so that through input in the preset region, the user can directly trigger the electronic device to display the object encryption interface corresponding to the second encryption manner.
  • the fourth input includes the first sub-input and the second sub-input
  • the second encryption control is an encryption control "content encryption”
  • the electronic device can enter the edit mode in response to the input, and then as shown in (b) in FIG. 5 , when the user drags the encryption control "content encryption” 41 to the upper left corner 42 of the display of the electronic device, the electronic device can create a target shortcut startup manner of the encryption manner of "content encryption” in the upper left corner 42 of the display of the electronic device in response to the input.
  • the electronic device may cancel the display of the second encryption control in the encryption manner setting interface, or the electronic device may display the second encryption control in the last display position of the encryption manner setting interface, or the electronic device may keep displaying the second encryption control in a display position where the second encryption control is located before receiving the fourth input.
  • This may be specifically determined according to an actual use requirement, and is not limited in this embodiment of this application.
  • the user can trigger the electronic device to create a shortcut startup manner of the encryption manner in the encryption manner setting interface, the user can trigger the electronic device to create a shortcut startup manner of a common encryption manner.
  • the user can directly trigger, through the input of the shortcut startup manner, display of the object processed in the encryption manner in the electronic device, which can simplify the operation of the user in the electronic device.
  • the user can trigger the electronic device to cancel the target shortcut startup manner through a specific input (such as the fifth input in the embodiment of this application), and display the second encryption control in the first display position in the encryption manner setting interface.
  • a specific input such as the fifth input in the embodiment of this application
  • the encryption method provided in the embodiment of this application may further include the following steps 209 and 210.
  • Step 209 The electronic device receives a fifth input by the user.
  • Step 210 In response to the fifth input, the electronic device cancels the target shortcut startup manner, and displaying the second encryption control in the first display position of the encryption manner setting interface.
  • the user can trigger the electronic device to cancel the target shortcut startup manner through the fifth input, and the electronic device can display the second encryption control in the first display position of the encryption manner setting interface.
  • the electronic device displays the encryption manner setting interface
  • the identifier of the second encryption manner is displayed in the preset region, and the user can perform an input of dragging the identifier out of the preset region (that is, the fifth input) to trigger the electronic device to cancel the target shortcut startup manner.
  • the user can trigger the electronic device to cancel the target shortcut startup manner by sliding from outside to inside or from inside to outside in the preset region (that is, the fifth input).
  • the user can trigger the electronic device to display the identifier of the object processed in the encryption manner (such as K encryption object identifiers in the embodiment of this application), and then by inputting on a certain encryption object identifier (such as the first encryption object identifier in the embodiment of this application) of these encryption object identifiers, the user can trigger the electronic device to cancel the encryption of an encryption object indicated by the encryption object identifier.
  • an identifier indicating the encryption manner such as the first object in the embodiment of this application
  • the encryption method provided in the embodiment of this application may further include the following steps 211 to 214.
  • Step 211 The electronic device receives a sixth input for the first object.
  • the first object may be used to indicate the third encryption manner in the electronic device.
  • Step 212 The electronic device displays K encryption object identifiers in response to the sixth input.
  • Encryption objects indicated by the K encryption object identifiers may be objects processed in a third encryption manner, and K is a positive integer.
  • the user can trigger the electronic device to display the identifiers of the K encryption objects processed in the third encryption manner (that is, the K encryption object identifiers).
  • each of the K encryption object identifiers respectively indicates an encryption object.
  • the first object may be a third encryption control corresponding to the third encryption manner, or may be an identifier of a shortcut startup manner of the third encryption manner, which may be determined according to actual usage requirements, and is not limited in this embodiment of this application.
  • the sixth input may be any possible input such as single-click input, a double-click input, a long-press input, or a re-press input for the first object, which may be determined according to actual usage requirements, and is not limited in this embodiment of the application.
  • the electronic device may display an object encryption page in response to the input, and the object encryption page may include 3 encryption object identifiers (that is, the K encryption object identifiers) as shown in (b) of FIG. 6 .
  • Step 213 The electronic device receives a seventh input by the user for a first encryption object identifier of the K encryption object identifiers.
  • Step 214 The electronic device cancels, in response to the seventh input, the encryption of an encryption object indicated by the first encryption object identifier.
  • the user can trigger, through the seventh input for the first encryption object identifier, the electronic device to cancel the encryption of the encryption object indicated by the first encryption object identifier.
  • the first encryption object identifier may be one encryption object identifier of the K encryption object identifiers, or may be multiple encryption object identifiers of the K encryption object identifiers. Specifically, this may be determined according to actual usage requirements, and is not limited in this embodiment of the application.
  • the electronic device may display a "cancel encryption" control at the bottom of the display of the electronic device in response to the sixth input.
  • the seventh input may be an input of dragging the first encryption object identifier to the "cancel encryption” control.
  • the electronic device when the user drags the encryption object identifier 44 to the "cancel encryption” control 45, the electronic device can cancel the encryption of the encryption object indicated by the encryption object identifier 44, so that the user can directly trigger the electronic device to display the object.
  • the electronic device when the user drags the encryption object identifier 46 to the "cancel encryption” control 45, the electronic device can cancel the encryption of the encryption object indicated by the encryption object identifier 46, so that the user can directly trigger the electronic device to display an interface of an application program indicated by the application icon.
  • the seventh input may include a third sub-input and a fourth sub-input
  • the third sub-input may be a long-press input for the first encryption object identifier
  • the electronic device may display a delete control on the first encryption object identifier in response to the input
  • the fourth sub-input may be a click input for the delete control.
  • the electronic device may cancel, in response to the input, encryption of the encryption object indicated by the first encryption object identifier.
  • the user can input for an identifier (such as the second object in the embodiment of the application) indicating a certain encryption manner in the electronic device (such as the fourth encryption manner in the embodiment of the application), to trigger the electronic device to display the identity information verification interface, and then when the identity information input by the user (such as the target identity information in the embodiment of this application) matches the preset identity information in the electronic device, the electronic device can display the object (such as the M encryption objects in the implementation of this application) processed in the encryption manner, so that the user can view the object processed in the encryption manner.
  • an identifier such as the second object in the embodiment of the application
  • the electronic device can display the identity information verification interface, and then when the identity information input by the user (such as the target identity information in the embodiment of this application) matches the preset identity information in the electronic device, the electronic device can display the object (such as the M encryption objects in the implementation of this application) processed in the encryption manner, so that the user can view the object processed in the encryption manner.
  • the encryption method provided in the embodiment of this application may further include the following steps 215 to 218.
  • Step 215 The electronic device receives an eighth input by the user for the second obj ect.
  • the second object may be used to indicate a fourth encryption manner in the electronic device.
  • Step 216 The electronic device displays an identity information verification interface in response to the eighth input.
  • the user can trigger, through the eighth input for the second object, the electronic device to display the identity information verification interface, so that the user can input identity information in the interface for identity information verification.
  • the second object may be the fourth encryption control corresponding to the fourth encryption manner, or may be a shortcut startup manner of the fourth encryption manner, which may be determined according to actual use requirements, and is not limited in this embodiment of this application.
  • the eighth input may be any possible input such as single-click input, a double-click input, a drag input, or a slide input for the second object, which may be determined according to actual usage requirements, and is not limited in this embodiment of the application.
  • the second object is a shortcut startup manner corresponding to the fourth encryption manner
  • the shortcut startup manner is created in the upper left corner of the display of the electronic device; as shown in (a) in FIG. 8 , the user can slide from outside to inside on the upper left corner of the display of the electronic device to trigger the electronic device to display the identity information verification interface as shown in (b) in FIG. 8 .
  • the user can trigger the electronic device to display the encryption control interface (for example, the interface 51 shown in (a) in FIG. 9 ), the encryption control interface may include multiple encryption controls, so that the user can trigger the electronic device to display the identity information verification interface by inputting on the fourth encryption control (such as the encryption control 52 shown in (a) in FIG. 9 ), to trigger the electronic device to display the identity information verification interface (for example, the interface 53 shown in (b) in FIG. 9 ).
  • the encryption control interface for example, the interface 51 shown in (a) in FIG. 9
  • the encryption control interface may include multiple encryption controls, so that the user can trigger the electronic device to display the identity information verification interface by inputting on the fourth encryption control (such as the encryption control 52 shown in (a) in FIG. 9 ), to trigger the electronic device to display the identity information verification interface (for example, the interface 53 shown in (b) in FIG. 9 ).
  • the electronic device after the electronic device receives the user's double-click input or long-press input in the indicator bar region for virtual gesture navigation (such as the indicator bar region 54 shown in (a) in FIG. 10 ), the electronic device can first display the identity information verification interface (such as the interface 55 shown in (b) in FIG. 10 ), and when the identity information input by the user matches the preset identity information in the electronic device, the electronic device can display the encryption control interface. In this way, multi-layer encryption protection can be performed, thereby improving privacy protection.
  • the identity information verification interface such as the interface 55 shown in (b) in FIG. 10
  • Step 217 The electronic device determines whether the input target identity information matches the preset identity information.
  • the user can input the target identity information in the identity information verification interface, so that the electronic device can determine that the target identity information matches the preset identity information in the electronic device. If the target identity information does not match the preset identity information, the electronic device may prompt the user that the input identity information is incorrect; if the target identity information matches the preset identity information, the electronic device may display the object processed in the fourth encryption manner (for example, M encryption objects in the embodiment of this application), that is, when the input target identity information matches the preset identity information, the electronic device executes the following step 218.
  • the fourth encryption manner for example, M encryption objects in the embodiment of this application
  • Step 218 The electronic device displays the M encryption objects in the form of plain text.
  • the M encryption objects may be objects processed in the fourth encryption manner, and M is a positive integer.
  • the electronic device when the target identity information input by the user matches the preset identity information, the electronic device can display the M encryption objects in the form of plain text, so that the user can directly view all objects processed in the fourth encryption manner.
  • the electronic device may first display the identifiers of the M encryption objects. If the user wants to view a certain encryption object of the M encryption objects, the user can input for the identifier of the encryption object, and the electronic device can display the identity information verification interface in response to the input, and if the identity information input by the user matches the preset identity information, the electronic device displays the encryption object. In this way, multi-layer encryption protection can be performed on encryption objects, thereby improving privacy protection.
  • the encryption device provided in the embodiments of this application will be described below by taking the encryption apparatus executing the encryption method in the embodiments of this application as an example.
  • this embodiment of this application provides an encryption apparatus 600, and the encryption apparatus 600 includes a receiving module 601, a display module 602, and a processing module 603.
  • the receiving module 601 is configured to receive a first input by a user; the display module 602 is configured to display N encryption controls in response to the first input, where each of the N encryption controls corresponds to an encryption manner; the receiving module 601 is further configured to receive a second input by the user for a target object currently displayed on the electronic device and a first encryption control of the N encryption controls; and the processing module 603 is configured to process, in a case that the first encryption manner matches the target object, the target object in the first encryption manner in response to the second input, where the first encryption manner is an encryption manner corresponding to the first encryption control.
  • the display module is specifically configured to display the N encryption controls according to a target order; where the target order is determined according to a target matching degree, and the target matching degree is a matching degree between the object currently displayed on the electronic device and an encryption manner corresponding to each of the N encryption controls.
  • the encryption device further includes a setting module; the receiving module is further configured to receive a third input by the user; the display module is further configured to display an encryption manner setting interface in response to the third input, where the encryption manner setting interface includes at least one encryption control, and the at least one encryption control is an encryption control corresponding to the encryption manner in the electronic device; the receiving module is further configured to receive a fourth input by the user for a second encryption control of the at least one encryption control; and the setting module is configured to create a target shortcut startup manner of the second encryption manner in response to the fourth input, where the second encryption manner is an encryption manner corresponding to the second encryption control.
  • the receiving module is further configured to receive a fifth input by the user; the setting module is further configured to in response to the fifth input, cancel the target shortcut startup manner; and the display module is further configured to in response to the fifth input, display the second encryption control in the first display position of the encryption manner setting interface.
  • the receiving module is further configured to receive a sixth input for a first object, where the first object is used to indicate a third encryption manner in the electronic device; the display module is further configured to display K encryption object identifiers in response to the sixth input, where encryption objects indicated by the K encryption object identifiers are objects processed in a third encryption manner, and K is a positive integer; the receiving module is further configured to receive a seventh input by the user for a first encryption object identifier of the K encryption object identifiers: and the processing module is further configured to cancel, in response to the seventh input, encryption of an encryption object indicated by the first encryption object identifier.
  • the receiving module is further configured to receive an eighth input by the user for a second object, where the second object is used to indicate a fourth encryption manner in the electronic device;
  • the display module is further configured to display an identity information verification interface in response to the eighth input received by the receiving module; and display M encryption objects in the form of plain text in a case that input target identity information matches preset identity information, where the M encryption objects are objects processed in the fourth encryption manner, and M is a positive integer.
  • the embodiments of this application provide an encryption apparatus. After receiving the first input, the N encryption controls can be displayed in response to the first input, and then after receiving the second input for the first encryption control of the N encryption controls and the target object, the target object can be directly processed in the first encryption manner in response to the second input if the first encryption manner corresponding to the first encryption control matches the target object, that is, the target object can be directly encrypted in the first encryption manner.
  • the encryption manner can be flexibly selected, and the operation method of object encryption is more convenient.
  • the encryption apparatus in the embodiments of this application may be an apparatus, and may also be a component, an integrated circuit, or a chip in an electronic device.
  • the apparatus may be a mobile electronic device, or may be a non-mobile electronic device.
  • the mobile electronic device may be a mobile phone, a tablet computer, a laptop computer, a palmtop computer, an in-vehicle electronic device, a wearable device, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a netbook, or a personal digital assistant (personal digital assistant, PDA).
  • the non-mobile electronic device may be a personal computer (personal computer, PC), a television (television, TV), an automated teller machine or a self-service machine. This is not specifically limited in the embodiments of this application.
  • the encryption apparatus in the embodiments of this application may be an apparatus with an operating system.
  • the operating system may be an Android (Android) operating system, may be an iOS operating system, or may be another possible operating system. This is not specifically limited in this embodiment of this application.
  • the encryption apparatus provided in this embodiment of the application can implement the processes that are implemented in the foregoing method embodiments. To avoid repetition, details are not described herein again.
  • the embodiments of this application further provide an electronic device 700, including a processor 701, a memory 702, and a program or instruction stored in the memory 702 and executable on the processor 701,
  • a processor 701 a memory 702
  • a program or instruction stored in the memory 702 and executable on the processor 701 When the program or instruction is executed by the processor 701, each process of the encryption method embodiment described above can be realized, and the same technical effect can be achieved. To avoid repetition, details are not repeated herein.
  • the electronic device in this embodiment of this application includes the foregoing mobile electronic device and the foregoing non-mobile electronic device.
  • FIG. 13 is a schematic diagram of a hardware structure of an electronic device for implementing embodiments of this application.
  • the electronic device 100 includes, but is not limited to: a radio frequency unit 101, a network module 102, an audio output unit 103, an input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, a processor 110, and the like.
  • the electronic device 100 may further include the power supply 111 (for example, a battery) supplying power to each component.
  • the power supply may be logically connected to the processor 110 by using a power management system, so as to implement functions such as charging management, discharging management and power consumption management by using the power management system.
  • a structure of the electronic device shown in FIG. 13 does not constitute a limitation on the electronic device, and may include more or fewer parts than those shown in the figure, or combine some components, or have different part arrangements. Details are not described herein again.
  • the user input unit 107 is configured to receive a first input by a user; the display unit 106 is configured to display N encryption controls in response to the first input, where each of the N encryption controls corresponds to an encryption manner; the user input unit 107 is further configured to receive a second input by the user for a target object currently displayed on the electronic device and a first encryption control of the N encryption controls; and the display unit 106 is configured to process, in a case that the first encryption manner matches the target object, the target object in the first encryption manner in response to the second input, where the first encryption manner is an encryption manner corresponding to the first encryption control.
  • the display unit 106 is specifically configured to display the N encryption controls according to a target order; where the target order is determined according to a target matching degree, and the target matching degree is a matching degree between the object currently displayed on the electronic device and an encryption manner corresponding to each of the N encryption controls.
  • the user input unit 107 is further configured to receive a third input by the user; the display unit 106 is further configured to display an encryption manner setting interface in response to the third input, where the encryption manner setting interface includes at least one encryption control, and the at least one encryption control is an encryption control corresponding to the encryption manner in the electronic device; the user input unit 107 is further configured to receive a fourth input by the user for a second encryption control of the at least one encryption control; and the processor 110 is configured to create a target shortcut startup manner of the second encryption manner in response to the fourth input, where the second encryption manner is an encryption manner corresponding to the second encryption control.
  • the user input unit 107 is further configured to receive a fifth input by the user; the processor 110 is further configured to in response to the fifth input, cancel the target shortcut startup manner, and the display unit 106 is further configured to in response to the fifth input, display the second encryption control in the first display position of the encryption manner setting interface.
  • the user input unit 107 is further configured to receive a sixth input by the user for a first object, where the first object is used to indicate a third encryption manner in the electronic device; the display unit 106 is further configured to display K encryption object identifiers in response to the sixth input, where encryption objects indicated by the K encryption object identifiers are objects processed in a third encryption manner, and K is a positive integer; the user input unit 107 is further configured to receive a seventh input by the user for a first encryption object identifier of the K encryption object identifiers: and the processor 110 is configured to cancel, in response to the seventh input, encryption of an encryption object indicated by the first encryption object identifier.
  • the user input unit 107 is further configured to receive an eighth input by the user for a second object, where the second object is used to indicate a fourth encryption manner in the electronic device; the display unit 106 is further configured to display an identity information verification interface in response to the eighth input; and display M encryption objects in the form of plain text in a case that input target identity information matches preset identity information, where the M encryption objects are objects processed in the fourth encryption manner, and M is a positive integer.
  • the embodiments of this application provide an electronic device. After receiving the first input, the N encryption controls can be displayed in response to the first input, and then after receiving the second input for the first encryption control of the N encryption controls and the target object, the target object can be directly processed in the first encryption manner in response to the second input if the first encryption manner corresponding to the first encryption control matches the target object, that is, the target object can be directly encrypted in the first encryption manner.
  • the encryption manner can be flexibly selected in the electronic device, and the operation method of encrypting the object through the electronic device is more convenient.
  • the receiving module in the encryption apparatus can be realized through the user input unit 107; the display module in the encryption apparatus can be realized through the display unit 106; and the processing module and the setting module in the encryption apparatus can be realized by the processor 110.
  • the radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the electronic device provides wireless broadband Internet access for the user by using the network module 102, for example, helping the user to send and receive an e-mail, brows a web page, and access streaming media.
  • the audio output unit 103 may include a speaker, a buzzer, and a receiver.
  • the input unit 104 may include a graphics processing unit (GPU) 1041 and a microphone 1042.
  • GPU graphics processing unit
  • the graphics processing unit 1041 processes image data of a static picture or a video obtained by an image capture apparatus (for example, a camera) in a video capture mode or image capture mode.
  • the display unit 106 may include a display panel 1061.
  • the display panel 1061 may be configured in a form such as a liquid crystal display or an organic light-emitting diode.
  • the user input unit 107 includes a touch panel 1071 and another input device 1072.
  • the touch panel 1071 is also referred to as a touchscreen.
  • the touch panel 1071 may include two parts: a touch detection apparatus and a touch controller.
  • the another input device 1072 may include but is not limited to a physical keyboard, a functional button (such as a volume control button or a power on/off button), a trackball, a mouse, and a joystick. Details are not described herein.
  • the memory 109 may be configured to store a software program and various data, including but not limited to an application program and an operating system.
  • the processor 110 may be integrated with an application processor and a modem processor.
  • the application processor mainly processes an operating system, a user interface, an application program, and the like.
  • the modem processor mainly processes wireless communication. It can be understood that, alternatively, the modem processor may not be integrated into the processor 110.
  • An embodiment of this application further provides a readable storage medium.
  • the readable storage medium stores a program or an instruction, and when the program or the instruction is executed by a processor, the various processes of the foregoing encryption method embodiment is performed and the same technical effects can be achieved. To avoid repetition, details are not described herein again.
  • the processor is the processor in the electronic device in the foregoing embodiment.
  • the readable storage medium may include a computer readable storage medium, such as a computer read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
  • An embodiment of this application further provides a chip, the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run programs or instructions to implement each process of the embodiment of the foregoing encryption method and the same technical effects can be achieved. To avoid repetition, details are not described herein again.
  • the chip mentioned in this embodiment of this application may also be referred to as a system-level chip, a system chip, a chip system, or a system on a chip.
  • a scope of the method and the apparatus in the implementations of this application is not limited to: performing a function in a sequence shown or discussed, and may further include: performing a function in a basically simultaneous manner or in a reverse sequence based on an involved function.
  • the described method may be performed in a different order, and various steps may be added, omitted, or combined.
  • features described with reference to some examples may be combined in other examples.
  • the computer software product is stored in a storage medium (such as a ROM/RAM, a hard disk, or an optical disc), and includes several instructions for instructing an electronic device (which may be a mobile phone, a computer, a server, an air conditioner, a network device, or the like) to perform the methods in the embodiments of this application.
  • a storage medium such as a ROM/RAM, a hard disk, or an optical disc
EP22745279.4A 2021-01-27 2022-01-26 Encryption method and apparatus, electronic device, and medium Pending EP4276667A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110112722.6A CN112948843B (zh) 2021-01-27 2021-01-27 加密方法、装置、电子设备及介质
PCT/CN2022/074041 WO2022161406A1 (zh) 2021-01-27 2022-01-26 加密方法、装置、电子设备及介质

Publications (1)

Publication Number Publication Date
EP4276667A1 true EP4276667A1 (en) 2023-11-15

Family

ID=76238013

Family Applications (1)

Application Number Title Priority Date Filing Date
EP22745279.4A Pending EP4276667A1 (en) 2021-01-27 2022-01-26 Encryption method and apparatus, electronic device, and medium

Country Status (5)

Country Link
US (1) US20230385426A1 (zh)
EP (1) EP4276667A1 (zh)
KR (1) KR20230136185A (zh)
CN (1) CN112948843B (zh)
WO (1) WO2022161406A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112948843B (zh) * 2021-01-27 2022-07-15 维沃移动通信有限公司 加密方法、装置、电子设备及介质
CN115757191B (zh) * 2023-01-05 2023-05-16 广州市千钧网络科技有限公司 一种数据处理方法和装置

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9165128B1 (en) * 2012-05-10 2015-10-20 Isaac S. Daniel System and method of securing content from public display on a mobile communication device
CN104700001B (zh) * 2013-12-04 2020-01-10 腾讯科技(深圳)有限公司 应用程序的信息加密方法及装置
CN105808238B (zh) * 2016-02-26 2019-03-22 四川效率源信息安全技术股份有限公司 一种安全Dock及其应用方法
CN106203061B (zh) * 2016-06-27 2020-03-06 维沃移动通信有限公司 一种应用程序的加密方法及移动终端
CN106203176A (zh) * 2016-07-29 2016-12-07 乐视控股(北京)有限公司 一种应用加密方法及装置
CN106599723B (zh) * 2016-12-19 2020-03-17 武汉斗鱼网络科技有限公司 一种文件加密方法及装置、文件解密方法及装置
CN107103247A (zh) * 2017-03-13 2017-08-29 宇龙计算机通信科技(深圳)有限公司 一种应用加密方法及装置
CN108509105B (zh) * 2018-03-16 2020-04-17 维沃移动通信有限公司 一种应用程序管理方法和终端
CN108491133B (zh) * 2018-03-28 2020-09-11 维沃移动通信有限公司 一种应用程序控制方法及终端
CN109886047B (zh) * 2019-03-21 2021-01-15 腾讯科技(深圳)有限公司 文件加密处理方法和装置
CN110457879A (zh) * 2019-06-26 2019-11-15 维沃移动通信有限公司 对象显示方法及终端设备
CN111371773A (zh) * 2020-02-28 2020-07-03 北京百度网讯科技有限公司 一种信息发送和显示方法、装置、设备及存储介质
CN111428223A (zh) * 2020-03-19 2020-07-17 上海传英信息技术有限公司 一种加密方法、加密装置、终端及计算机可读存储介质
CN112948843B (zh) * 2021-01-27 2022-07-15 维沃移动通信有限公司 加密方法、装置、电子设备及介质

Also Published As

Publication number Publication date
WO2022161406A1 (zh) 2022-08-04
US20230385426A1 (en) 2023-11-30
CN112948843A (zh) 2021-06-11
CN112948843B (zh) 2022-07-15
KR20230136185A (ko) 2023-09-26

Similar Documents

Publication Publication Date Title
US20230385426A1 (en) Encryption Method and Apparatus, Electronic Device, and Medium
AU2012354514A1 (en) Method and apparatus for managing message
EP4206883A1 (en) Permission setting method and apparatus and electronic device
CN112399006B (zh) 文件发送方法、装置及电子设备
CN112433693B (zh) 分屏显示方法、装置及电子设备
WO2022135290A1 (zh) 截屏方法、装置及电子设备
WO2023016463A1 (zh) 显示控制方法、装置、电子设备和介质
CN112698762B (zh) 图标显示方法、装置及电子设备
CN112783388B (zh) 显示方法、显示装置和电子设备
WO2023198064A1 (zh) 应用程序启动方法、装置、电子设备及存储介质
WO2023093719A1 (zh) 应用管理方法、装置、电子设备和介质
WO2023155858A1 (zh) 文档编辑方法及其装置
WO2022247866A1 (zh) 应用图标管理方法、装置及电子设备
CN112929494B (zh) 信息处理方法、装置、介质和电子设备
CN111796733B (zh) 图像显示方法、图像显示装置和电子设备
CN114518821A (zh) 应用图标管理方法、装置和电子设备
CN113807831A (zh) 支付方法和装置
CN114116087A (zh) 双系统间的界面操作方法、装置、电子设备及介质
CN113784192A (zh) 投屏方法、投屏装置和电子设备
CN113840035A (zh) 信息分享方法、装置、电子设备和可读存储介质
CN112286615A (zh) 应用程序的信息显示方法及装置
CN113037618B (zh) 图像分享方法及装置
CN113703810B (zh) 一种更新方法和装置
CN112596642B (zh) 数据共享方法、装置、设备和可读存储介质
CN115390712A (zh) 图标隐藏方法、装置、电子设备及存储介质

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20230809

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)